
Table of Contents
P-2602HWUDL-D User’s Guide
17
14.4 Using Call Park and Pickup ............................................................................................. 237
14.5 Checking the ZyXEL Device’s IP Address ....................................................................... 238
14.6 Auto Provisioning and Auto Firmware Upgrade .............................................................. 238
14.7 Phone Functions Summary ............................................................................................. 238
Chapter 15
Firewalls................................................................................................................................. 241
15.1 Firewall Overview ............................................................................................................ 241
15.1.1 Stateful Inspection Firewall .................................................................................... 241
15.1.2 About the ZyXEL Device Firewall ........................................................................... 241
15.1.3 Guidelines For Enhancing Security With Your Firewall .......................................... 242
15.2 General Firewall Policy Overview ................................................................................... 242
15.3 Security Considerations ...................................................................................................244
15.4 Triangle Route ................................................................................................................. 244
15.4.1 The “Triangle Route” Problem ................................................................................ 245
15.4.2 Solving the “Triangle Route” Problem .................................................................... 245
15.5 General Firewall Policy ................................................................................................... 246
15.6 Firewall Rules Summary ................................................................................................. 247
15.6.1 Configuring Firewall Rules ................................................................................... 249
15.6.2 Customized Services ............................................................................................ 252
15.6.3 Configuring A Customized Service ...................................................................... 252
15.7 Example Firewall Rule .....................................................................................................253
15.8 Firewall Thresholds ........................................................................................................ 257
15.8.1 Threshold Values ................................................................................................... 258
15.8.2 Configuring Firewall Thresholds ............................................................................. 258
Chapter 16
Content Filtering ................................................................................................................... 261
16.1 Content Filtering Overview ............................................................................................. 261
16.2 Configuring Keyword Blocking ....................................................................................... 261
16.3 Configuring the Schedule .............................................................................................. 262
16.4 Configuring Trusted Computers ..................................................................................... 263
Chapter 17
Introduction to IPSec............................................................................................................ 265
17.1 VPN Overview ................................................................................................................. 265
17.1.1 IPSec ...................................................................................................................... 265
17.1.2 Security Association ............................................................................................... 265
17.1.3 Other Terminology .................................................................................................. 265
17.1.4 VPN Applications ................................................................................................... 266
17.2 IPSec Architecture ........................................................................................................... 266
17.2.1 IPSec Algorithms .................................................................................................... 267
17.2.2 Key Management ................................................................................................... 267
Kommentare zu diesen Handbüchern